kernel-rt-debug-modules-internal vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the kernel-rt-debug-modules-internal package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
CVE-2024-27393

*
  • M
CVE-2024-27399

*
  • M
CVE-2024-27398

*
  • M
CVE-2024-27397

*
  • M
CVE-2024-27401

*
  • M
CVE-2024-27395

*
  • M
CVE-2024-21823

*
  • M
CVE-2023-52656

*
  • M
CVE-2023-52654

*
  • H
Resource Exhaustion

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Cross-site Scripting (XSS)

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Resource Exhaustion

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Allocation of Resources Without Limits or Throttling

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
CVE-2023-39321

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Cross-site Scripting (XSS)

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Cross-site Scripting (XSS)

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Resource Exhaustion

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Resource Exhaustion

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Improper Handling of Missing Special Element

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Use After Free

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
CVE-2023-2728

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
CVE-2023-2727

<0:5.14.0-284.36.1.rt14.321.el9_2
  • H
Resource Exhaustion

<0:5.14.0-284.36.1.rt14.321.el9_2
  • L
CVE-2024-27043

*
  • M
CVE-2024-26974

*
  • M
CVE-2022-48702

*
  • M
CVE-2022-48691

*
  • M
CVE-2022-48694

*
  • M
CVE-2022-48696

*
  • M
CVE-2022-48704

*
  • M
CVE-2022-48687

*
  • M
CVE-2022-48689

*
  • M
CVE-2022-48705

*
  • M
CVE-2022-48671

*
  • M
CVE-2022-48686

*
  • M
CVE-2022-48675

*
  • M
CVE-2022-48703

*
  • M
CVE-2022-48695

*
  • M
CVE-2022-48672

*
  • M
CVE-2022-48673

*
  • M
CVE-2022-48670

*
  • M
CVE-2022-48697

*
  • M
CVE-2022-48701

*
  • M
CVE-2022-48692

*
  • M
CVE-2022-48690

*
  • M
CVE-2022-48693

*
  • M
CVE-2022-48688

*
  • M
CVE-2024-27057

*
  • M
CVE-2024-27073

*
  • M
CVE-2024-27390

*
  • M
CVE-2024-27077

*
  • M
CVE-2024-27003

*
  • M
CVE-2024-27030

*
  • M
CVE-2024-27019

*
  • M
CVE-2024-27011

*
  • M
CVE-2024-27038

*
  • M
CVE-2024-27017

*
  • M
CVE-2024-27020

*
  • M
CVE-2024-27047

*
  • M
CVE-2024-27389

*
  • M
CVE-2024-26993

*
  • M
CVE-2024-27052

*
  • M
CVE-2024-27026

*
  • M
CVE-2024-27010

*
  • M
CVE-2024-26991

*
  • M
CVE-2024-27065

*
  • M
CVE-2024-27049

*
  • M
CVE-2024-27388

*
  • M
CVE-2024-27048

*
  • M
CVE-2024-27056

*
  • M
CVE-2024-27004

*
  • M
CVE-2024-27042

*
  • M
CVE-2024-26976

*
  • M
CVE-2024-27027

*
  • M
CVE-2024-27014

*
  • M
CVE-2024-27016

*
  • M
CVE-2024-26947

*
  • M
CVE-2024-26989

*
  • M
CVE-2024-26934

*
  • M
CVE-2024-27025

*
  • M
CVE-2024-27031

*
  • M
CVE-2024-27062

*
  • M
CVE-2024-26931

*
  • M
CVE-2024-27023

*
  • M
CVE-2024-26975

*
  • M
CVE-2024-27059

*
  • M
CVE-2024-26962

*
  • M
CVE-2024-27013

*
  • M
CVE-2024-26982

*
  • M
CVE-2024-27046

*
  • M
CVE-2024-27000

*
  • M
CVE-2024-26930

*
  • M
CVE-2024-26938

*
  • M
CVE-2024-26972

*
  • M
CVE-2024-27055

*
  • M
CVE-2024-27050

*
  • M
CVE-2024-26984

*
  • M
CVE-2024-27079

*
  • M
CVE-2024-27002

*
  • M
CVE-2024-26992

*
  • M
CVE-2024-26988

*
  • M
CVE-2024-27022

*
  • M
CVE-2024-27012

*
  • M
CVE-2024-26961

*
  • M
CVE-2024-26999

*
  • M
CVE-2024-26973

*
  • M
CVE-2024-26953

*
  • M
CVE-2024-26990

*
  • M
CVE-2024-26950

*
  • M
CVE-2024-26958

*
  • M
CVE-2024-26933

*
  • M
CVE-2024-26951

*
  • M
CVE-2024-27039

*
  • M
CVE-2024-26945

*
  • M
CVE-2024-26960

*
  • M
CVE-2024-26987

*
  • M
CVE-2024-26979

*
  • M
CVE-2024-27015

*
  • M
CVE-2024-26939

*
  • M
CVE-2024-26946

*
  • M
CVE-2024-26937

*
  • M
CVE-2024-26964

*
  • M
CVE-2024-26935

*
  • M
CVE-2024-26929

*
  • M
CVE-2024-26940

*
  • M
CVE-2023-52651

*
  • M
CVE-2023-52650

*
  • M
CVE-2023-52653

*
  • M
CVE-2023-52649

*
  • M
CVE-2023-52648

*
  • M
CVE-2022-48669

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • L
Use After Free

*
  • M
Deadlock

*
  • L
Use After Free

*
  • M
Out-of-Bounds

*
  • M
CVE-2024-26927

*
  • M
CVE-2023-52646

*
  • M
CVE-2022-48643

*
  • M
CVE-2022-48660

*
  • M
CVE-2022-48666

*
  • M
CVE-2022-48662

*
  • M
CVE-2022-48651

*
  • M
CVE-2022-48657

*
  • M
CVE-2022-48663

*
  • M
CVE-2022-48654

*
  • M
CVE-2022-48652

*
  • M
CVE-2022-48653

*
  • M
CVE-2022-48641

*
  • M
CVE-2022-48659

*
  • M
CVE-2022-48648

*
  • M
CVE-2022-48658

*
  • M
CVE-2022-48650

*
  • M
CVE-2022-48646

*
  • M
CVE-2022-48644

*
  • M
CVE-2022-48647

*
  • M
CVE-2022-48638

*
  • M
CVE-2022-48642

*
  • M
CVE-2022-48649

*
  • M
CVE-2022-48632

*
  • M
CVE-2022-48631

*
  • M
CVE-2022-48640

*
  • M
CVE-2022-48637

*
  • M
CVE-2022-48639

*
  • M
CVE-2022-48635

*
  • M
Integer Underflow

*
  • M
Resource Leak

*
  • L
Improper Validation of Specified Index, Position, or Offset in Input

*
  • M
Use After Free

*
  • L
Race Condition

*
  • M
Race Condition

*
  • M
Improper Locking

*
  • L
Improper Input Validation

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
CVE-2024-26921

*
  • M
Resource Injection

*
  • M
CVE-2024-26919

*
  • M
Race Condition

*
  • M
CVE-2024-26915

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Incomplete Cleanup

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Unchecked Return Value to NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Resource Leak

*
  • L
Race Condition

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Resource Injection

*
  • L
Unchecked Return Value to NULL Pointer Dereference

*
  • M
CVE-2024-26920

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Stack-based Buffer Overflow

*
  • L
Memory Leak

*
  • L
Out-of-bounds Read

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Race Condition

*
  • L
Data Element containing Pointer Item without Proper Copy Control Element

*
  • M
CVE-2024-26918

*
  • L
Improper Resource Locking

*
  • M
Stack-based Buffer Overflow

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
NULL Pointer Dereference

*
  • L
Buffer Access with Incorrect Length Value

*
  • L
Resource Leak

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Neutralization of Null Byte or NUL Character

*
  • L
Improper Input Validation

*
  • L
Excessive Platform Resource Consumption within a Loop

*
  • M
Out-of-bounds Read

*
  • H
Improper Handling of Unicode Encoding

<0:5.14.0-284.16.1.rt14.301.el9_2
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
Race Condition

*
  • L
CVE-2024-26782

*
  • M
CVE-2024-26786

*
  • M
CVE-2024-26783

*
  • M
CVE-2024-26803

*
  • L
Resource Injection

*
  • M
Use After Free

*
  • M
CVE-2024-26785

*
  • M
CVE-2024-26804

*
  • M
CVE-2024-26801

*
  • M
Improper Input Validation

*
  • L
Deadlock

*
  • M
Improper Handling of Values

*
  • L
Divide By Zero

*
  • M
Improper Handling of Values

*
  • M
Incomplete Cleanup

*
  • M
Race Condition

*
  • M
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Divide By Zero

*
  • L
Deadlock

*
  • L
Unchecked Input for Loop Condition

*
  • M
Race Condition

*
  • M
Improper Null Termination

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Double Free

*
  • M
Race Condition

*
  • M
Deadlock

*
  • M
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • M
Divide By Zero

*
  • L
Resource Injection

*
  • M
Improper Input Validation

*
  • L
Improper Null Termination

*
  • L
Improper Input Validation

*
  • M
Improper Handling of Undefined Parameters

*
  • M
Race Condition

*
  • M
NULL Pointer Dereference

*
  • L
Race Condition

*
  • M
Improper Input Validation

*
  • M
Use After Free

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • M
Deadlock

*
  • M
Race Condition

*
  • L
Unchecked Input for Loop Condition

*
  • M
Improper Protection Against Physical Side Channels

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • M
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Improper Input Validation

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • M
Resource Injection

*
  • M
Resource Injection

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
Improper Input Validation

*
  • L
Resource Injection

*
  • L
Improper Input Validation

*
  • M
Missing Lock Check

*
  • L
Improper Locking

*
  • M
Integer Underflow

*
  • H
Improper Handling of Unicode Encoding

<0:5.14.0-284.16.1.rt14.301.el9_2
  • L
NULL Pointer Dereference

*
  • L
Deadlock

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • L
Resource Injection

*
  • M
Out-of-bounds Read

*
  • L
Race Condition

*
  • L
Resource Injection

*
  • M
Improper Resource Locking

*
  • M
Incorrect Calculation of Buffer Size

*
  • L
Resource Injection

*
  • L
Race Condition

*
  • M
Improper Resource Locking

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Missing Initialization of a Variable

*
  • M
Improper Input Validation

*
  • M
Resource Injection

*
  • L
Missing Lock Check

*
  • M
Resource Injection

*
  • M
Deadlock

*
  • L
Stack-based Buffer Overflow

*
  • M
Resource Leak

*
  • M
Unchecked Input for Loop Condition

*
  • L
Memory Leak

*
  • M
Return of Wrong Status Code

*
  • M
Use After Free

*
  • M
Use of NullPointerException Catch to Detect NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Deadlock

*
  • M
Deadlock

*
  • L
Improper Resource Locking

*
  • M
Deadlock

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Locking

*
  • L
NULL Pointer Dereference

*
  • L
Improper Input Validation

*
  • M
Use After Free

*
  • L
Resource Exhaustion

*
  • M
Return of Stack Variable Address

*
  • M
Race Condition

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
Improper Resource Shutdown or Release

*
  • M
NULL Pointer Dereference

*
  • M
Improper Protection Against Physical Side Channels

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Resource Locking

*
  • M
Improper Resource Locking

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Resource Leak

*
  • L
Use of Uninitialized Variable

*
  • M
Use After Free

*
  • L
Double Free

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Improper Resource Locking

*
  • M
Resource Leak

*
  • M
Integer Overflow or Wraparound

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2024-26602

*
  • M
Unchecked Return Value

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Incorrect Calculation of Buffer Size

*
  • M
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • M
CVE-2023-52520

*
  • M
CVE-2023-52575

*
  • L
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • L
Race Condition

*
  • M
Memory Leak

*
  • M
Resource Leak

*
  • M
Memory Leak

*
  • M
Resource Injection

*
  • M
Improper Handling of Overlap Between Protected Memory Ranges

*
  • L
Missing Encryption of Sensitive Data

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • L
Divide By Zero

*
  • L
Resource Leak

*
  • L
Resource Injection

*
  • L
Resource Leak

*
  • L
Improper Input Validation

*
  • M
CVE-2024-26615

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • L
Memory Leak

*
  • M
Deadlock

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Memory Leak

*
  • L
Use After Free

*
  • M
Deadlock

*
  • M
Out-of-Bounds

*
  • M
NULL Pointer Dereference

*
  • M
CVE-2021-47018

*
  • M
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Resource Leak

*
  • L
Resource Leak

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Resource Leak

*
  • L
Resource Leak

*
  • M
Race Condition

*
  • M
Resource Leak

*
  • L
Improper Check or Handling of Exceptional Conditions

*
  • L
Stack-based Buffer Overflow

*
  • M
Use After Free

*
  • L
Resource Leak

*
  • M
Range Error

*
  • M
Improper Input Validation

*
  • L
CVE-2021-46914

*
  • L
Missing Support for Integrity Check

*
  • L
Resource Injection

*
  • L
NULL Pointer Dereference

*
  • M
Improper Input Validation

*
  • L
Unchecked Error Condition

*
  • L
Improper Input Validation

*
  • L
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Integer Overflow or Wraparound

*
  • M
Out-of-bounds Read

*
  • L
CVE-2023-52474

*
  • M
Race Condition

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Range Error

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • L
Deadlock

*
  • L
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
NULL Pointer Dereference

*
  • M
Untrusted Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
CVE-2023-52462

*
  • L
Use After Free

*
  • M
CVE-2023-52455

*
  • M
NULL Pointer Dereference

*
  • M
Improper Validation of Array Index

*
  • L
Buffer Access with Incorrect Length Value

*
  • M
NULL Pointer Dereference

*
  • L
Improper Initialization

*
  • L
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Return of Wrong Status Code

*
  • M
Use After Free

*
  • M
CVE-2024-26581

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Improper Authentication

*
  • M
Memory Leak

*
  • M
Improper Check for Unusual or Exceptional Conditions

*
  • M
CVE-2024-25744

*
  • M
CVE-2024-25741

*
  • M
Stack-based Buffer Overflow

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • L
Time-of-check Time-of-use (TOCTOU)

*
  • H
Resource Exhaustion

<0:5.14.0-284.16.1.rt14.301.el9_2
  • M
Information Exposure

*
  • H
Use After Free

*
  • M
Use After Free

*
  • H
Improper Handling of Unicode Encoding

<0:5.14.0-284.16.1.rt14.301.el9_2
  • H
Arbitrary Code Injection

<0:5.14.0-284.16.1.rt14.301.el9_2
  • H
Resource Exhaustion

<0:5.14.0-284.16.1.rt14.301.el9_2
  • H
Directory Traversal

<0:5.14.0-284.16.1.rt14.301.el9_2
  • H
Use of a Broken or Risky Cryptographic Algorithm

<0:5.14.0-284.16.1.rt14.301.el9_2
  • L
Information Exposure

*
  • M
NULL Pointer Dereference

*
  • M
Resource Exhaustion

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • H
Out-of-bounds Write

*
  • M
Deadlock

*
  • M
Deadlock

*
  • M
Improper Handling of Values

*
  • M
Integer Underflow

*
  • M
NULL Pointer Dereference

*
  • M
Resource Leak

*
  • M
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Write

*
  • M
Race Condition

*
  • H
Use After Free

*
  • M
Memory Leak

*
  • M
Race Condition

*
  • M
Out-of-bounds Write

*
  • H
Race Condition

*
  • L
NULL Pointer Dereference

*
  • H
Use After Free

*
  • H
Out-of-Bounds

*
  • M
Man-in-the-Middle (MitM)

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • M
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Improper Preservation of Permissions

*
  • M
Resource Exhaustion

*
  • M
Authentication Bypass

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • M
Race Condition

*
  • L
Use After Free

*
  • M
Improper Handling of Exceptional Conditions

*
  • M
NULL Pointer Dereference

*
  • M
Out-of-bounds Write

*
  • M
Improper Privilege Management

*
  • H
Improper Update of Reference Count

*
  • H
Buffer Overflow

*
  • H
Double Free

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • H
Use After Free

*
  • M
NULL Pointer Dereference

*
  • H
Improper Input Validation

*
  • M
Use After Free

*
  • M
Race Condition

*
  • H
Integer Underflow

*
  • H
Use After Free

*
  • H
Use After Free

*
  • H
Use After Free

*
  • M
Use After Free

*
  • H
Use After Free

*
  • M
Use After Free

*
  • H
Use After Free

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Improper Access Control

*
  • M
Use After Free

*
  • M
Stack-based Buffer Overflow

*
  • M
Improper Validation of Array Index

*
  • M
Information Exposure

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Use After Free

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • H
Double Free

*
  • H
Use After Free

*
  • M
Information Exposure

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Double Free

*
  • M
Resource Exhaustion

*
  • L
NULL Pointer Dereference

*
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • M
Incorrect Bitwise Shift of Integer

*
  • M
CVE-2023-31084

*
  • M
Divide By Zero

*
  • M
Race Condition

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Reachable Assertion

*
  • L
Improper Resource Locking

*
  • M
Improper Update of Reference Count

*
  • M
Improperly Implemented Security Check for Standard

*
  • M
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Use After Free

*
  • M
Double Free

*
  • M
Double Free

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • L
Improper Initialization

*
  • M
NULL Pointer Dereference

*
  • M
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • M
CVE-2022-27672

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • M
Memory Leak

*
  • M
Out-of-bounds Write

*
  • L
Externally Controlled Reference to a Resource in Another Sphere

*
  • M
Memory Leak

*
  • L
Use After Free

*
  • M
Use After Free

*
  • L
Memory Leak

*
  • L
NULL Pointer Dereference

*
  • M
Information Exposure

*
  • M
Logging of Excessive Data

*
  • M
Integer Overflow or Wraparound

*
  • L
Memory Leak

*
  • L
Memory Leak

*
  • M
Use After Free

*
  • M
Race Condition

*
  • M
Improper Locking

*
  • M
Access of Uninitialized Pointer

*
  • M
Use After Free

*
  • M
Use After Free

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Expected Behavior Violation

*
  • M
Use After Free

*
  • M
Use After Free

*
  • M
NULL Pointer Dereference

*
  • M
Integer Overflow or Wraparound

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • M
Use After Free

*
  • L
Out-of-bounds Read

*
  • M
NULL Pointer Dereference

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Race Condition

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Out-of-bounds Write

*
  • L
Buffer Overflow

*
  • M
Memory Leak

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Release of Invalid Pointer or Reference

*
  • M
Out-of-Bounds

*
  • M
Out-of-bounds Write

*